|Publication number||US20060190419 A1|
|Application number||US 11/062,601|
|Publication date||Aug 24, 2006|
|Filing date||Feb 22, 2005|
|Priority date||Feb 22, 2005|
|Publication number||062601, 11062601, US 2006/0190419 A1, US 2006/190419 A1, US 20060190419 A1, US 20060190419A1, US 2006190419 A1, US 2006190419A1, US-A1-20060190419, US-A1-2006190419, US2006/0190419A1, US2006/190419A1, US20060190419 A1, US20060190419A1, US2006190419 A1, US2006190419A1|
|Inventors||Frank Bunn, Richard Adair|
|Original Assignee||Bunn Frank E, Adair Richard D|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (14), Referenced by (95), Classifications (4)|
|External Links: USPTO, USPTO Assignment, Espacenet|
Bunn et al, U.S. patent application Ser. No. 10/626,888 (filed Jul. 25, 2003), “Voice, Lip-reading, Face and Emotion Stress Analysis, Fuzzy Logic Intelligent Camera System”
Bunn et al, U.S. patent application (filed Dec. 6, 2004, number not yet assigned), “Data Analysis Algorithms for a Voice, Lip-reading, Face, Emotion, Intoxication Impairment and Violent Behavior Stress Analysis, Fuzzy Logic Intelligent Camera System.”
Video surveillance for security of things, places, and people has long been a major area of patenting of methods, systems, techniques, and technology. Analyses of data from security video cameras for security surveillance are well known. Lemelson, in 1991 U.S. Pat. No. 5,067,012, reveals a method and system for scanning and inspecting video camera images for automated recognition of objects, and Higashimura et al, in 2002 U.S. Pat. No. 6,747,554, reveal a network surveillance unit and means for recording video security camera images which can be related to local alarm signals with methods and means for storing, viewing and distributing these data via internet WEB communications. Alexander et al, in 2005 U.S. Pat. No. 6,839,731, reveal shared network methods and means for sharing information from databases via internet WEB communications with secure access implementation of ID cards and PIN numbers, video data surveillance, voice recognition and such high security systems to maintain secure information communications.
The well-known video surveillance technology for recognition of objects, such as revealed in the Lemelson 1991 U.S. Pat. No. 5,067,012 for detecting objects, has been applied to detecting and recognizing specific persons and tracking their movement by head appearance and movement of subjects as revealed in the Darrell et al 2002 U.S. Pat. No. 6,445,810. Refining observations to a singular subject, video surveillance methods have been applied to the actual movement of body parts of a subject, such as tracking eye movement in the Strachan 1999 U.S. Pat. No. 5,980,041 by reflecting infrared light from a hologram off the retina of the subject and using triangulation of the reflected light for development of physiological measurement tools for eye focus and movement, and in the Harman 2002 U.S. Pat. No. 6,459,446 by reflecting infrared light off the cornea of the subject and using multiple cameras to track eye movement for development of viewing technology for 3-D video.
Significantly advancing the video surveillance technology, Bunn et al, in 2003 U.S. patent application Ser. No. 10/626,888, teach a voice, lip-reading, face and emotion stress fuzzy logic intelligent camera system which analyzes digital video data to automatically detect stress on people, animals or things for the purpose of recognizing facial or body appearance or movement or speech which could indicate stress on, or danger or a threat or potential of danger or threat to or from persons, animals, actions, activities, or things. Bunn et al, in 2003 U.S. patent application Ser. No. 10/626,888, contemplate including detecting and estimating intoxication and impairment levels by alcohol or drugs of subjects observed and linking this detection to identification of the observed subject for facial and voice recognition as well as identification by ID card, photo ID and the like. Bunn et al, in 2004 U.S. patent application (Filed Dec. 6, 2004, number not yet assigned), further teach the fuzzy logic algorithms that permit detection and interpretation of the features describing the facial or body or speech or appearance or movement noted in U.S. Ser. No. 10/626,888.
The preferred embodiment of the present invention is focused on the integration of the video surveillance technology prior art whether referred to herein or otherwise for the purpose of detection of intoxication, drunken and impaired behavior including the identification of subjects and the possible prevention of underage drinking in a localized establishment or place by means of a system that we call SoberCam™, and the sharing of such information throughout a communications network of central database systems and participating networked groups, systems or agencies alerting security personnel, systems and agencies for appropriate response in a distributed system we call LastCall™ Network.
A significant problem exists with most of these conventional embodiments of video surveillance and security types of systems in that they acquire very large and unwieldy volumes of data. Surveillance systems in the prior art view, observe, record and process many details of the images from video cameras and systems but do not deal well with the control and limitation of the data contained in the video data stream whether in analogue or digital format. With the modern state of the art, digital video recording (DVR) systems and high-speed, high-resolution cameras can generate 1.5 terabytes of data in 15 minutes.
This invention deals with the ways and means for overcoming this digital glut.
A preferred embodiment of the invention herein combines software, neural logic, fuzzy logic, neural networks and artificial intelligence to monitor, analyze and select data bits that occur when a pre-determined algorithm or electronic signature is activated. The algorithm acts as a switch that signals the system to discard irrelevant data while saving selected items. In practice, 99.9983% of the usual video surveillance data will be discarded and only 0.0017% retained for security personnel attention. One method of achieving this reduction in “real time” is to have the system buffering data for a short time while analyzing it and upon being activated, the system would record the buffer data incoming data until again activated to stop recording. The buffer would need to be large and the system processing speed fast enough so that non of the desired data are lost.
In another preferred embodiment of the invention, the algorithm selects and retains images of an individual subject only when there are legally valid grounds for doing so on the basis of just cause. All other images can be discarded.
In another preferred embodiment of the invention, the algorithm and image assessment system can use the monitoring and intelligence capabilities of the software to adjust to ever-increasing speeds and resolution improvements in the video camera systems thereby maintaining the minimum data storage levels as the camera technology advances.
In effect, our intelligent camera acts as a video surveillance data analyzer for 99.9% of the time and as a conventional surveillance camera system storing images for 0.1% of the time. In a preferred embodiment of the invention, the algorithms could be fine-tuned to a specific surveillance application and scene being observed, such that the analyzer could remove 99.9983% of the images and thus retain only 0.0017% for a reduction of data storage of nearly a factor of 60,0000.
Bunn et al, patent application U.S. Ser. No. 10/626,888 filed Jul. 25, 2003, teaches algorithms such as staggering, drug-taking and dealing, violence, threatening movements, throwing objects and related anti-social activities that can trigger intelligent camera systems to automatically recognize these occurrences and notify the appropriate security personnel. These video data recordings are of sufficient resolution and frame speed that can be matched by the existing DVR data acquisition and storage and image database management systems of the day.
A preferred embodiment of the invention goes further and uses high-resolution, high-speed video camera systems with different algorithms to measure fine resolution characteristics of observed subjects such as, but not limited to, measuring pupil dilation of the eyes, sweating, blushing, and other bio-behavioral aspects at the onset, and notes changes in these aspects thereafter and calibrates them to levels of impairment, intoxication and behavioral changes. In this application, the subjects being observed in effect provide their own basic database standards against which to measure change. This we call the SoberCam™ application.
The SoberCam™ camera system envisioned in a preferred embodiment of the invention will also use algorithms to scan at high-resolution and high-speed video surveillance large venues such as entertainment arenas, sporting fields of play and the like for which the system and algorithms can establish virtual barriers to detect incursions into selected restricted areas. Camera resolution is such as to detect a person moving from higher levels in the venue to close proximity to the entertainment or playing surfaces or areas for which algorithms will detect and notice and command the system to monitor and record this movement for later analyses or identification. Potentially rowdy spectators can also be similarly identified and noted and images recorded. In a preferred embodiment of the invention, subsequent escalation of activities by the observed subjects can be further analyzed by the algorithms to detect hotspots of potentially threatening or violent behavior and the system can alert security personnel for appropriate action to be taken.
In a preferred embodiment of the invention, the SoberCam™ observations and database-stored imagery can be recalled for the venue in question as an information source of video evidence to support legal actions as needed.
In a preferred embodiment of the invention, the information stored in the system's databases of images, video data and algorithm results can be shared with other groups, entertainment and sporting venues, related clubs, bars and the like as a pre-emptive warning of local, nearby neighborhood, inter-city, nation-wide or international potential threat, disruption or problem whether at the same time, other times or other sites. This sharing of such information we call LastCall™ Network.
In a preferred embodiment of the invention, the occurrence for example of intoxication by an observed subject at say nightclub A can trigger storage of video data and by using facial recognition of subjects entering the nightclub A at later times and comparing these to the recorded database can permit the system to recognize previous trouble makers and alert security to take appropriate action. This would be LastCall™ Network operating on a restricted local basis.
In a preferred embodiment of the invention to illustrate an example, in which the information from the above occurrence at nightclub A is shared with Nightclub B and Nightclub C in the neighborhood this would be LastCall™ Network operating on the citywide basis. A further example is if the above occurrence happened at a sporting venue in City A and is shared with a sporting venue in City B this would be LastCall™ Network that could be inter-city or nation-wide or international depending on where they are located.
In a preferred embodiment of the invention, SoberCam™ could be used to prevent underage drinking in which the system would use technology of ID cards such as but not limited to student, health, driver's license, social security, credit and such like cards, scanning of both magnetic strip or smart card information and imbedded picture ID. The system would use facial recognition to assess if the subject being observed on site is the same as the ID picture and information and whether the subject appears to be under drinking age. Features such as lack of wrinkles and non-existence of beard, and balding and sagging neck skin or frequency and timber of voice are not perfect by can be indicators of relative age. If the analysis algorithms suspect underage, the system can inform security personnel to investigate and if appropriate to take action to deny entrance to a drinking establishment or area. This information could be shared via the LastCall™ Network to participating groups, drinking establishments and the like, thereby further assisting the prevention of underage drinking.
In another preferred embodiment of the invention, utilizing wide-angle and zooming narrow angle video camera technology with high-resolution and high-speed capabilities the SoberCam™ system utilizing illumination, such as but not limited to, infrared directed from the camera location towards subjects could view the reflected infrared light from the eyes of the subjects such as at a sporting event arena to detect the number of subjects looking specifically in the direction of the camera. This would be similar to the “animal in the headlights” example of a cat looking towards your oncoming vehicle at night, where light from the headlights will reflect off the animal's retina directly back to the vehicle such that the driver may see only the two bright spots of light reflecting from the cat's eyes. Algorithms in the SoberCam™ system could simply count the number of bright spots and divide by 2 to get a good approximation of the number of subjects looking directly at the camera and light source.
This retina reflection of light application is not strictly tracking eye movement of the subjects but rather detecting at any instant, the number of subjects looking in a specific direction. If the camera and light source are located near where an advertisement such as on an illuminated sign or billboard or electronic display such as a “JumboTron” the system in this embodiment of the invention could measure the effectiveness of what is being displayed such as an advertisement. In effect the system algorithms are measuring crowd response to displayed images or messages, which could collect statistics that could be interpreted to assess effectiveness of the display, or the message or advertisement. If the system is observing subjects entering a venue and the system detects the subjects watching a billboard and thus not watching where they are walking, say down stairways or aisles, this could provide evidence of the subject's responsibility should an accident such as tripping occur.
In another preferred embodiment of the invention, the collection of video data over time provides the SoberCam™ system with information from which to derive statistically important conclusions. Effectiveness of advertising noted above is one such conclusion. Changes in the actions of subjects over time can permit statistical conclusion of the onset of intoxication or impairment of the observed subjects, or the escalation of violence, or the occurrence of a health condition such as seizure or heart attack.
Sharing of information in databases via the LastCall™ Network application need not be limited to those data selected by the SoberCam™ intelligent video surveillance camera system but can incorporate related databases such as personal identification information, legal or criminal activities, actions or convictions, health and drug or alcohol information, suspected terrorist activities and the like. Sharing of all such information permits the algorithms to detect problems or potential problems quickly, automatically allowing the system to notify the authorities and security personnel to take appropriate action.
The descriptions that follow are provided so as to enable any person skilled in the art to make and use the invention, and sets forth some modes presently contemplated by the inventors of carrying out their invention. Various modifications, however, will remain readily apparent to those skilled in the art, since the generic principles of the present invention have been defined herein.
Data for processing by the algorithms revealed in this invention are obtained from observations by an intelligent Camera System means incorporating the use of, but not limited to, sensors, input-output devices such as a surveillance camera means with incorporated local controller, 101, with associated illumination means, 102, and listening audio means, 103, and video means, 104, functions and full pan, tilt and zoom computer-controlled motion for monitoring of a given scene, situation, place, thing, persons or environment. A unique aspect of the Camera System means is the incorporation of the new technologies of high-resolution, low noise-level, low light-level, high-speed digital camera systems which permits the algorithms to perform in the real-world environment of nightclubs, bars and large venue arenas as well as they perform in the laboratory monochromatic calibration environments. It is these modern enabling technologies that give rise to the development of the algorithmic means of this patent.
In a preferred embodiment, the algorithms of this invention could be analyzing movements of a person or persons and their activity, 110, with a plurality of sensors and input-output means such as but not limited to audio and video, the data from which can be communicated by wired, 105, or wireless, 106, to a local facility, 107, so that the intelligent analysis means, located at the local, 107, or central, 116 facilitiy employing the algorithms of this patent can interpret those person or persons and/or activities, their conditions or drug or alcohol induced impairments and possibility for potential threat from the subject's appearance, movements and actions. Observations of subjects and identification credentials such as magnetic or intelligent ID cards, driver's license or photo ID, heath ID can also permit identification of the subject by using but not limited to algorithmic comparisons to earlier observation databases of audio, visual and speech and text information to which the facilities are connected via the Internet WEB, 111, or by hardwired land or telephonic, 112, or wireless links, 117 to other News MultiMedia, 113, Government, 114 and Associated, 115 databases. Analyses results can be sent out through the WEB 111, or land links, 112, or by wireless, 117, to computers and hand held devices, 109 or to the cellular network and cell phone units, 108.
A unique aspect of the fuzzy logic algorithmic Exceptions Data Engine means of this invention is its ability to learn from the data collected from these observations, 201, and from data in and collected for the comparison databases. The process of analyzing these data to determine an exception, 202, creates the definable occurrences of exceptions that can be used to eliminate unwanted data, 203, 204, and 205. Depending upon selectable criteria that define the exceptions, 203, the elimination of data at any give time could range from 100%, no recording, through to 0% with recording of all observations. A typical embodiment of this invention could result in elimination of 99.9983% of the observations, reducing database information storage, 206, by a factor of nearly 60,000 while efficiently citing and reporting exceptions to decision makers, 207, permitting appropriate action to be taken, 208.
For example, if the subject under observation is a young person the analyses, 202, with face recognition could compare photo ID and general facial appearance, 203, to determine that the person may be underage. If available, related databases could be queried, 204, to see if birth date information such as given on a driver's license could confirm the subject's age. In any event the Exceptions Data Engine would have queried, 205, and detected the occurrence of the exception and stored that occurrence in the exceptions databas, 206, that the subject may be underage and informed the decision makers, 207, to take appropriate action, 208, such as to deny that person access to a drinking establishment, area or venue.
In a preferred embodiment of this invention, the observations can include but are not limited to observing from a few to large crowds of subjects who have been illuminated by a lighting means, 102, located near the intelligent camera means, 101, from which data vision analyses for an exception request to the Eyes analysis, 203, by the Exceptions Data Engine could detect the number of subjects within view, who are looking in the camera direction. This analysis could employ detection of the reflection from the retinas of the subjects' eyes that if looking in the direction of the camera and the light source located there, would appear as bright spots. In darkened locations such as sports or entertainment venues, using infrared illumination, which is not visible to the subjects, would not be invasive and would permit the subjects' pupils to remain more open and hence increase the reflected light resulting in brighter and more easily detected reflections. With sufficient camera speed and resolution technology, the individual eyes of each subject would be resolved to create two such bright spots and the analyses could determine how many subjects were looking towards the camera and light source. Such information could be recorded as an exception, 206 and passed to inform decision makers, 207, for use to measure response of subjects to whatever was at the location of the camera such as advertising, video displays, security information, entertainment and such like.
These database means and facilities, whether incorporated into the camera means or located elsewhere, can include local and remote databases including but not limited to: the Multi-Media, 113, such as print including newspapers, radio and TV; the Government, 114, such as criminal activity/conviction, or incarceration, or driver's license identification, or terrorist activity; and the Associated data systems, 115, such as medical/mental health, or education, and the like. Health information, in particular could be critical in understanding the actions, emotions and motions of persons to recognize the differences between drunkenness, heart attack, diabetic coma, epileptic seizure and the like. These databases as part of the Camera System means can be linked via the WEB, hardwired, telephony or wireless means for access, analyses by the algorithmic means revealed in this patent.
In a preferred embodiment of the invention, the SoberCam™ Local fuzzy logic algorithm system means, learning by the Camera System means can result from a plurality of fuzzy logic algorithmic analyses incorporated into the SoberCam™ Intelligence Engine illustrated in
In a preferred embodiment of the invention, for the above example of a subject who appears underage, the related databases, 304, may contain a driver's license information and photo ID that could confirm the Exceptions Data Engine facial recognition analysis of the subject and SoberCam™ Intelligence Engine could identify that the subject indeed was younger than legal drinking age. In this example, related database searches, 304, in a health database could indicate the subject has a serious heart condition and in a legal database could indicate there is an outstanding arrest warrant for the subject. The analysis system means, 303, so learns and updates the occurrences databases, 305, that this person currently under surveillance observation is underage, has an outstanding arrest warrant and the fuzzy logic algorithmic system means reports to the security systems and personnel, 306. In this example the decision makers, 307, would be advised to deny the person access to drinking areas, venues or establishments and to immediately inform the police for appropriate action. Prevention of underage drinking is a unique aspect of this invention. Assisting police is another unique aspect of this invention.
The SoberCam™ Intelligence Engine includes a plurality of computer analysis techniques and technologies, software, firmware and hardware methods and designs including but not limited to recording and storage and retrieval of data, video pattern recognition, facial recognition, body action recognition, stress analysis of facial appearance and movement, stress analysis of body appearance and movement, emotional condition stress analysis from facial and/or speech and/or body action, surrounding environment condition assessment, voice stress analysis, voice recognition, voice speech recognition to text, lip reading recognition of speech and conversion to text, deep extraction of information and meaning from text or multi-media information, identification ID and photo ID input-output data analyses and the like.
Many of these techniques and technologies have been noted in the background to this invention, but what is unique in this invention is that we reveal an Exceptions Data Engine means for massive reduction of stored data observations and the SoberCam™ Intelligence Engine automated learning and decision analysis for the detection and understanding of a threat or potential threat or condition of or by a person or persons or animals or objects, by their actions, or their appearance, or their impairment intoxication, or their personal information and history, or any combination of these.
In a preferred embodiment of this invention, we reveal a method and means to significantly utilize the above Exceptions Data Engine and SoberCam™ Intelligence Engine processing and analyses of these video, audio, input-output and sensor data through a centralized Vision storage, retrieval and analysis facility. Unique to this embodiment of the invention, this facility provides the capability of networked sharing of Image, Vision and related data Information directed to fighting underage drinking, preventing drunk driving, and preventing the escalation of threatening actions or situations. We call this the LastCall™ Network of Fuzzy Logic Algorithmic System Means.
The LastCall™ Network allows permitted members of the network such as Venue C, 401, Club B, 409, and Club C, 404, each reducing data via their individual Exceptions Data Engine, 402, to access the Shared LastCall™ Communications Network, 403, to exchange data and information with a Central Processing and Storage Facility, 405. The central processing and storage facility operating the SoberCam™ Intelligence Engine, 408, can store, analyze, interpret and categorize these data and analyses results in the associated databases, 406, as described above, and report to the decision makers to take appropriate action, 407.
Unique to the LastCall™ Network is its ability to permit access to the network members approved at various levels, to access results and exception occurrences of local area, citywide, national, or international information depending on their level of access permission. This increases the effectiveness and utility of the exceptions data and extends the reach of the LastCall™ Network Fuzzy Logic Algorithmic System Means from the local to the citywide to the National and to the International scene.
In a preferred embodiment of the invention, the participating members of the Network could be automatically updated with recent exception occurrences from the local area, citywide, national or international databases. The members could have this information sent to their local systems, and could have it recorded, displayed, noted to wireless cellular phones or personal data assistants (PDA's) and the like. In the above example of the young person who is under legal drinking age and with an outstanding arrest warrant as detected by the SoberCam™ Intelligent Engine, the person could possibly slip away from the establishment where they were detected. The person could then attempt to enter a nearby establishment also on the Network that could have already informed them to be on the lookout for the person thereby assisting the security personnel in advance. If the person appears, the Network would identify the person and collaborate to the security personnel of the problem with this person so immediate action could be taken. If the person is a security threat, wide dissemination of the information through the Network could help to prevent a national or international security threat.
We have indicated just some but not all of the examples of preferred embodiments, applications and uses of the Algorithm Analysis System means revealed in this invention that would come to mind of a person or persons skilled in the art of security systems.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US6071236 *||Jun 2, 1998||Jun 6, 2000||First Opinion Corporation||Method of determining mental health status in a computerized medical diagnostic system|
|US6113540 *||Feb 23, 1999||Sep 5, 2000||First Opinion Corporation||Computerized medical diagnostic and treatment advice system|
|US6418424 *||May 4, 1999||Jul 9, 2002||Steven M. Hoffberg||Ergonomic man-machine interface incorporating adaptive pattern recognition based control system|
|US6482156 *||Mar 5, 2001||Nov 19, 2002||First Opinion Corporation||Computerized medical diagnostic and treatment advice system including network access|
|US7027621 *||Mar 15, 2002||Apr 11, 2006||Mikos, Ltd.||Method and apparatus for operator condition monitoring and assessment|
|US7127087 *||Nov 5, 2004||Oct 24, 2006||Microsoft Corporation||Pose-invariant face recognition system and process|
|US20010029322 *||Mar 5, 2001||Oct 11, 2001||Iliff Edwin C.||Computerized medical diagnostic and treatment advice system including network access|
|US20030231788 *||Apr 1, 2003||Dec 18, 2003||Artiom Yukhin||Methods and systems for detecting and recognizing an object based on 3D image data|
|US20040117638 *||Nov 21, 2003||Jun 17, 2004||Monroe David A.||Method for incorporating facial recognition technology in a multimedia surveillance system|
|US20040120557 *||Dec 18, 2002||Jun 24, 2004||Sabol John M.||Data processing and feedback method and system|
|US20040122787 *||Dec 18, 2002||Jun 24, 2004||Avinash Gopal B.||Enhanced computer-assisted medical data processing system and method|
|US20040210159 *||Aug 8, 2003||Oct 21, 2004||Osman Kibar||Determining a psychological state of a subject|
|US20040240712 *||Apr 5, 2004||Dec 2, 2004||Lumidigm, Inc.||Multispectral biometric sensor|
|US20060109341 *||Jul 9, 2003||May 25, 2006||Roke Manor Research Limited||Video motion anomaly detector|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7495687 *||Aug 30, 2006||Feb 24, 2009||F4W, Inc.||System and methods for video surveillance in networks|
|US7668750||Mar 10, 2004||Feb 23, 2010||David S Bonalle||Securing RF transactions using a transactions counter|
|US7690577||Sep 20, 2007||Apr 6, 2010||Blayn W Beenau||Registering a biometric for radio frequency transactions|
|US7725427||Sep 28, 2004||May 25, 2010||Fred Bishop||Recurrent billing maintenance with radio frequency payment devices|
|US7769632||Aug 23, 2004||Aug 3, 2010||Promovu, Inc.||System for selectively communicating promotional information to a person|
|US7793845||Aug 3, 2009||Sep 14, 2010||American Express Travel Related Services Company, Inc.||Smartcard transaction system and method|
|US7814332||Sep 6, 2007||Oct 12, 2010||Blayn W Beenau||Voiceprint biometrics on a payment device|
|US7847688 *||Dec 6, 2006||Dec 7, 2010||Morpho||Method and apparatus of protecting a physical access|
|US7860271 *||Sep 5, 2006||Dec 28, 2010||Zippy Technology Corp.||Portable image monitoring and identifying device|
|US7886157||Jan 25, 2008||Feb 8, 2011||Xatra Fund Mx, Llc||Hand geometry recognition biometrics on a fob|
|US7889052||Jan 10, 2003||Feb 15, 2011||Xatra Fund Mx, Llc||Authorizing payment subsequent to RF transactions|
|US7962342 *||Aug 22, 2006||Jun 14, 2011||Avaya Inc.||Dynamic user interface for the temporarily impaired based on automatic analysis for speech patterns|
|US7978085||Mar 2, 2009||Jul 12, 2011||University Of South Florida||Human and physical asset movement pattern analyzer|
|US7988038||Sep 6, 2007||Aug 2, 2011||Xatra Fund Mx, Llc||System for biometric security using a fob|
|US7988647 *||Mar 16, 2009||Aug 2, 2011||Bunn Frank E||Assessment of medical conditions by determining mobility|
|US8001054||Jan 4, 2006||Aug 16, 2011||American Express Travel Related Services Company, Inc.||System and method for generating an unpredictable number using a seeded algorithm|
|US8016191||Aug 9, 2010||Sep 13, 2011||American Express Travel Related Services Company, Inc.||Smartcard transaction system and method|
|US8074889||Sep 6, 2007||Dec 13, 2011||Xatra Fund Mx, Llc||System for biometric security using a fob|
|US8131012||Feb 8, 2008||Mar 6, 2012||Behavioral Recognition Systems, Inc.||Behavioral recognition system|
|US8167430||Aug 31, 2009||May 1, 2012||Behavioral Recognition Systems, Inc.||Unsupervised learning of temporal anomalies for a video surveillance system|
|US8170283||Sep 17, 2009||May 1, 2012||Behavioral Recognition Systems Inc.||Video surveillance system configured to analyze complex behaviors using alternating layers of clustering and sequencing|
|US8175333||Sep 11, 2008||May 8, 2012||Behavioral Recognition Systems, Inc.||Estimator identifier component for behavioral recognition system|
|US8180105||Sep 17, 2009||May 15, 2012||Behavioral Recognition Systems, Inc.||Classifier anomalies for observed behaviors in a video surveillance system|
|US8189905||Jul 9, 2008||May 29, 2012||Behavioral Recognition Systems, Inc.||Cognitive model for a machine-learning engine in a video analysis system|
|US8200011||Apr 30, 2008||Jun 12, 2012||Behavioral Recognition Systems, Inc.||Context processor for video analysis system|
|US8214299||Aug 18, 2010||Jul 3, 2012||American Express Travel Related Services Company, Inc.||Methods and apparatus for conducting electronic transactions|
|US8218818||Jul 10, 2012||Behavioral Recognition Systems, Inc.||Foreground object tracking|
|US8218819||Sep 1, 2009||Jul 10, 2012||Behavioral Recognition Systems, Inc.||Foreground object detection in a video surveillance system|
|US8249931||Jul 30, 2010||Aug 21, 2012||Promovu, Inc.||System for selectively communicating promotional information to a person|
|US8270732||Aug 31, 2009||Sep 18, 2012||Behavioral Recognition Systems, Inc.||Clustering nodes in a self-organizing map using an adaptive resonance theory network|
|US8270733||Aug 31, 2009||Sep 18, 2012||Behavioral Recognition Systems, Inc.||Identifying anomalous object types during classification|
|US8279042||Sep 20, 2007||Oct 2, 2012||Xatra Fund Mx, Llc||Iris scan biometrics on a payment device|
|US8280153||Aug 18, 2009||Oct 2, 2012||Behavioral Recognition Systems||Visualizing and updating learned trajectories in video surveillance systems|
|US8284025||Sep 20, 2007||Oct 9, 2012||Xatra Fund Mx, Llc||Method and system for auditory recognition biometrics on a FOB|
|US8285046||Feb 18, 2009||Oct 9, 2012||Behavioral Recognition Systems, Inc.||Adaptive update of background pixel thresholds using sudden illumination change detection|
|US8285060||Aug 31, 2009||Oct 9, 2012||Behavioral Recognition Systems, Inc.||Detecting anomalous trajectories in a video surveillance system|
|US8289136||Sep 20, 2007||Oct 16, 2012||Xatra Fund Mx, Llc||Hand geometry biometrics on a payment device|
|US8294552||Sep 6, 2007||Oct 23, 2012||Xatra Fund Mx, Llc||Facial scan biometrics on a payment device|
|US8295591||Aug 18, 2009||Oct 23, 2012||Behavioral Recognition Systems, Inc.||Adaptive voting experts for incremental segmentation of sequences with prediction in a video surveillance system|
|US8295649 *||Nov 8, 2007||Oct 23, 2012||Nextgenid, Inc.||System and method for parallel processing of images from a large number of cameras|
|US8300924||Sep 11, 2008||Oct 30, 2012||Behavioral Recognition Systems, Inc.||Tracker component for behavioral recognition system|
|US8340352||Aug 18, 2009||Dec 25, 2012||Behavioral Recognition Systems, Inc.||Inter-trajectory anomaly detection using adaptive voting experts in a video surveillance system|
|US8358834||Aug 18, 2009||Jan 22, 2013||Behavioral Recognition Systems||Background model for complex and dynamic scenes|
|US8379085||Aug 18, 2009||Feb 19, 2013||Behavioral Recognition Systems, Inc.||Intra-trajectory anomaly detection using adaptive voting experts in a video surveillance system|
|US8411935||Jul 9, 2008||Apr 2, 2013||Behavioral Recognition Systems, Inc.||Semantic representation module of a machine-learning engine in a video analysis system|
|US8416296||Apr 14, 2009||Apr 9, 2013||Behavioral Recognition Systems, Inc.||Mapper component for multiple art networks in a video analysis system|
|US8422735 *||Apr 1, 2008||Apr 16, 2013||Samsung Electronics Co., Ltd.||Imaging apparatus for detecting a scene where a person appears and a detecting method thereof|
|US8423476||Apr 13, 2011||Apr 16, 2013||American Express Travel Related Services Company, Inc.||Methods and apparatus for conducting electronic transactions|
|US8433658||Apr 13, 2011||Apr 30, 2013||American Express Travel Related Services Company, Inc.||Methods and apparatus for conducting electronic transactions|
|US8458032||Jul 13, 2012||Jun 4, 2013||Promovu, Inc.||System for selectively communicating promotional information to a person|
|US8489513||Apr 13, 2011||Jul 16, 2013||American Express Travel Related Services Company, Inc.||Methods and apparatus for conducting electronic transactions|
|US8493409||Aug 18, 2009||Jul 23, 2013||Behavioral Recognition Systems, Inc.||Visualizing and updating sequences and segments in a video surveillance system|
|US8494222||May 15, 2012||Jul 23, 2013||Behavioral Recognition Systems, Inc.||Classifier anomalies for observed behaviors in a video surveillance system|
|US8548927||Mar 26, 2004||Oct 1, 2013||Xatra Fund Mx, Llc||Biometric registration for facilitating an RF transaction|
|US8576281 *||Sep 12, 2008||Nov 5, 2013||Its-7 Pty Ltd||Smart network camera system-on-a-chip|
|US8620028||Mar 6, 2012||Dec 31, 2013||Behavioral Recognition Systems, Inc.||Behavioral recognition system|
|US8625884||Aug 18, 2009||Jan 7, 2014||Behavioral Recognition Systems, Inc.||Visualizing and updating learned event maps in surveillance systems|
|US8639563||Jun 27, 2007||Jan 28, 2014||International Business Machines Corporation||Generating customized marketing messages at a customer level using current events data|
|US8705861||Jun 12, 2012||Apr 22, 2014||Behavioral Recognition Systems, Inc.||Context processor for video analysis system|
|US8775238 *||Sep 27, 2007||Jul 8, 2014||International Business Machines Corporation||Generating customized disincentive marketing content for a customer based on customer risk assessment|
|US8786702||Aug 31, 2009||Jul 22, 2014||Behavioral Recognition Systems, Inc.||Visualizing and updating long-term memory percepts in a video surveillance system|
|US8797405||Aug 31, 2009||Aug 5, 2014||Behavioral Recognition Systems, Inc.||Visualizing and updating classifications in a video surveillance system|
|US8812355||Jun 29, 2007||Aug 19, 2014||International Business Machines Corporation||Generating customized marketing messages for a customer using dynamic customer behavior data|
|US8831972||Sep 27, 2007||Sep 9, 2014||International Business Machines Corporation||Generating a customer risk assessment using dynamic customer data|
|US8924310||Jun 15, 2012||Dec 30, 2014||Lead Core Fund, L.L.C.||Methods and apparatus for conducting electronic transactions|
|US8938402||Jun 15, 2012||Jan 20, 2015||Lead Core Fund, L.L.C.||Methods and apparatus for conducting electronic transactions|
|US8943558 *||Mar 8, 2013||Jan 27, 2015||Next Level Security Systems, Inc.||System and method for monitoring a threat|
|US9024719||Oct 15, 2004||May 5, 2015||Xatra Fund Mx, Llc||RF transaction system and method for storing user personal data|
|US9031857||May 3, 2007||May 12, 2015||International Business Machines Corporation||Generating customized marketing messages at the customer level based on biometric data|
|US9031880||Oct 25, 2006||May 12, 2015||Iii Holdings 1, Llc||Systems and methods for non-traditional payment using biometric data|
|US9104918||Aug 20, 2013||Aug 11, 2015||Behavioral Recognition Systems, Inc.||Method and system for detecting sea-surface oil|
|US9111148||Jun 27, 2013||Aug 18, 2015||Behavioral Recognition Systems, Inc.||Unsupervised learning of feature anomalies for a video surveillance system|
|US9111353||Jun 28, 2013||Aug 18, 2015||Behavioral Recognition Systems, Inc.||Adaptive illuminance filter in a video analysis system|
|US9113143||Jun 28, 2013||Aug 18, 2015||Behavioral Recognition Systems, Inc.||Detecting and responding to an out-of-focus camera in a video analytics system|
|US9123227 *||Oct 13, 2008||Sep 1, 2015||The Boeing Company||System for checking security of video surveillance of an area|
|US9141863 *||Jul 21, 2008||Sep 22, 2015||Facefirst, Llc||Managed biometric-based notification system and method|
|US20060000895 *||Jul 1, 2004||Jan 5, 2006||American Express Travel Related Services Company, Inc.||Method and system for facial recognition biometrics on a smartcard|
|US20080123967 *||Nov 8, 2007||May 29, 2008||Cryptometrics, Inc.||System and method for parallel image processing|
|US20090066790 *||Sep 12, 2008||Mar 12, 2009||Tarik Hammadou||Smart network camera system-on-a-chip|
|US20090110247 *||Apr 1, 2008||Apr 30, 2009||Samsung Electronics Co., Ltd.||Imaging apparatus for detecting a scene where a person appears and a detecting method thereof|
|US20100014717 *||Jan 21, 2010||Airborne Biometrics Group, Inc.||Managed Biometric-Based Notification System and Method|
|US20100091108 *||Oct 13, 2008||Apr 15, 2010||Boeing Company||System for checking security of video surveillance of an area|
|US20110016148 *||Jul 15, 2010||Jan 20, 2011||Ydreams - Informatica, S.A.||Systems and methods for inputting transient data into a persistent world|
|US20110295880 *||Jul 16, 2010||Dec 1, 2011||Antonio Casanova Tavares Travasos||Process for monitoring the success of the administration of a fluid to a non heterogenous biological target, and system that enables the execution of said process|
|US20120019359 *||Jan 26, 2012||Hon Hai Precision Industry Co., Ltd.||Vehicle security system and method of using the same|
|US20120169880 *||Aug 5, 2011||Jul 5, 2012||Schneider Electric Buildings Llc||Method and system for video-based gesture recognition to assist in access control|
|US20130250039 *||Mar 20, 2012||Sep 26, 2013||Microsoft Corporation||Wide-angle depth imaging lens construction|
|US20140063237 *||Sep 3, 2012||Mar 6, 2014||Transportation Security Enterprises, Inc.(TSE), a Delaware corporation||System and method for anonymous object identifier generation and usage for tracking|
|US20140259114 *||Mar 8, 2013||Sep 11, 2014||Next Level Security Systems, Inc.||System and method for monitoring a threat|
|USRE43157||Jan 31, 2008||Feb 7, 2012||Xatra Fund Mx, Llc||System and method for reassociating an account number to another transaction account|
|USRE45416||Jun 15, 2012||Mar 17, 2015||Xatra Fund Mx, Llc||Processing an RF transaction using a routing number|
|WO2008150304A1 *||Sep 19, 2007||Dec 11, 2008||Gianni Arcaini||Method and apparatus for automatic noninvasive illegal rider detection system|
|WO2009052574A1 *||Oct 24, 2008||Apr 30, 2009||Andrew James Mathers||Improvements in oudoor advertising metrics|
|WO2010051037A1 *||Nov 3, 2009||May 6, 2010||Bruce Reiner||Visually directed human-computer interaction for medical applications|
|WO2012092102A1 *||Dec 22, 2011||Jul 5, 2012||Schneider Electric Buildings Llc||Method and system for detecting duress|